MSTIC-AA-BROMINE-2022-03

advertisement
MICROSOFT CONFIDENTIAL
MSTIC Activity Alert – BROMINE 0322-01
Active Targeting of Data Center Management Tools
NOTE: Microsoft notifies customers that are targeted or compromised by this or any other actor related to observed activity. This
update is for advisory purposes only.
Microsoft Threat Intelligence Center (MSTIC) has observed targeted reconnaissance and potential intrusion activity
focused on power management (PDU’s) as well as data center infrastructure management (DCIM) appliances and
applications by an activity group tracked by Microsoft as BROMINE. MSTIC has observed recent activity that
indicates that BROMINE targets datacenters to gain access to pursue their intended targets – the datacenter
customers. BROMINE has historically used brute force attacks, attacks leveraging default credentials, and
exploiting known unpatched vulnerabilities to gain initial access to network devices, including infrastructure
management tools.
MSTIC assesses that BROMINE is a state sponsored activity group originating from Russia that operates to
advance the strategic objectives of the Russian Federation. Given the current high level of tension between Russia
and NATO partners and the US Government’s warnings of retaliatory cyberattacks related to geopolitical events in
Ukraine, Microsoft is distributing this activity alert to share indicators to enable customers to evaluate their risk
and improve defenses against additional attacks.
Background
BROMINE is an activity group that has historically targeted a variety of global industries including organizations
associated with critical infrastructure, energy, aviation, oil and gas, engineering, manufacturing, defense,
transportation, law enforcement and United States state/local government. BROMINE is the Microsoft code name
for this activity group. Other security researchers have used Havex, DragonFly, DragonFly 2.0, and Energetic Bear
to refer to similar or related activities.
Activity Description
Targeting of IT & Data Center Management Appliances and Software
MSTIC has observed reconnaissance and limited probing of publicly exposed IT & Data Center management tools
and appliances, including Software-as-a- Service (SaaS) managed capabilities. The following software or services
have been observed targets in BROMINE operations:
•
•
•
•
•
•
•
•
•
Device42
Nlyte Software
Sunbird dcTrack
Panduit Smartzone
Cormant-CS DCIM
Vertiv Trellis
Geist Environet
Claroty Platform
Eaton BrightLayers Datacenter Suite
MICROSOFT CONFIDENTIAL
Activity Alert – BROMINE 0322-01
1
MICROSOFT CONFIDENTIAL
•
•
•
FNT Command Platform
Various Raritan power and KVM solutions
**Various hardware appliances from manufacturers of power and cooling
Based upon historical methods of BROMINE, it is likely that the actor is using default passwords, credential
guessing and potentially public CVEs to compromise accounts and devices.
Analyst Note: The above list is limited to observations by Microsoft and should not be considered exhaustive as
BROMINE is an adaptable threat actor that adjusts to operational needs to accomplish their objective.
Recommended Defensive Measures
Given the significant threat posed by BROMINE and the non-traditional manner of their intrusions, MSTIC
recommends that customers and partners implement the following specific guidance. For these recommendations
to be effective, ensure that a proper inventory of devices and software for IT and data center management have
been performed to maximize coverage across the environment.
Vulnerability Scanning
•
•
•
Check with the vendor of devices/software for any known vulnerabilities and patch as necessary.
Validate common default/weak credentials are not allowed by performing scans against
devices/software to test for known default/weak credentials.
Perform perimeter scans for publicly exposed interfaces, applications and systems and reduce attack
surface where possible.
Enable Auditing
•
•
•
Enable audit logs at the highest level and granularity as possible. At a minimum, audit conditions
should provide the ability to detect account usage, access, and alterations.
Increase local audit log retention storage and forward audit logs to a centralized platform to enhance
continuous monitoring efforts.
If possible, designate a standard time format (UTC) for logs . This will greatly increase the ability to
correlate logs in the case where an investigation may be needed.
Implement Strong Passwords and Multi-Factor Authentication
•
•
Ensure the removal of any default/weak credentials.
Implement multi-factor authentication methods as an added layer of security for accessing devices.
Audit and Implement Controls for Anomalous Authentication
•
•
•
Audit accounts and proactively rotate existing credentials on highest risk devices.
Review logs for access attempts by known attacker-controlled IPs.
Review audit logs for access attempts and perform additional analysis if suspicious access is identified.
Attack Surface Reduction
•
Remove any unnecessary access from external connections. If there is a strong business justification
for a device/system to be publicly facing, implement necessary technical controls to prevent
MICROSOFT CONFIDENTIAL
Activity Alert – BROMINE 0322-01
2
MICROSOFT CONFIDENTIAL
•
unauthorized access to that device/system (multi-factor authentication, complex passwords,
conditional access policies, etc.). If a device/system is only accessible internally, technical controls
should still be placed to limit access.
Reduce unnecessarily exposed ports, protocols, and services on devices.
Indicators of Compromise
MSTIC is providing the following Indicators of Compromise (IOCs) observed related to recent activity. This list
should not be considered an exhaustive list for audit and review purposes but is provided to assist with known
threat activity. Since BROMINE leverages compromised infrastructure as a proxy, discoveries of these IP addresses
authenticating to your organization should be reviewed for malicious activity and context to confirm an incident.
Additional infrastructure may be used by the actor for post-exploitation and would likely be dedicated
infrastructure in common hosting providers.
INDICATOR
TYPE
DESCRIPTION
37.187.9.26
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
77.223.107.13
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
37.48.120.137
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
135.181.29.229
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
159.253.23.250
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
5.196.90.105
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
88.214.241.146
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
94.130.168.63
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
45.55.24.95
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
176.9.84.83
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
5.135.182.109
IPAddress
BROMINE Proxy – Actor Controlled Infrastructure
NOTE: The data in this document is provided to you subject to the following conditions: Your organization may use the data
solely for informational, remediation, and defensive purposes. The data may be inaccurate and/or may refer to legitimate but
compromised properties. THIS DOCUMENT IS PROVIDED “AS-IS” AND FOR INFORMATIONAL PURPOSES ONLY. MICROSOFT
DISCLAIMS ALL EXPRESS, IMPLIED, OR STATUTORY WARRANTIES. THIS INCLUDES THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.
MICROSOFT CONFIDENTIAL
Activity Alert – BROMINE 0322-01
3
Download